Movatterモバイル変換


[0]ホーム

URL:


US20160239674A1 - Network-based client side encryption - Google Patents

Network-based client side encryption
Download PDF

Info

Publication number
US20160239674A1
US20160239674A1US14/620,724US201514620724AUS2016239674A1US 20160239674 A1US20160239674 A1US 20160239674A1US 201514620724 AUS201514620724 AUS 201514620724AUS 2016239674 A1US2016239674 A1US 2016239674A1
Authority
US
United States
Prior art keywords
key
encrypted file
file
unique identifier
client device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/620,724
Other versions
US9800579B2 (en
Inventor
Guanqun BAO
Manish Sharma
Devin BLONG
Kevin FLORES
Tushar CHAUDHARY
Gaurav Gupta
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Verizon Patent and Licensing Inc
Original Assignee
Verizon Patent and Licensing Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verizon Patent and Licensing IncfiledCriticalVerizon Patent and Licensing Inc
Priority to US14/620,724priorityCriticalpatent/US9800579B2/en
Assigned to VERIZON PATENT AND LICENSING INC.reassignmentVERIZON PATENT AND LICENSING INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CHAUDHARY, TUSHAR, SHARMA, MANISH, BAO, GUANQUN, BLONG, DEVIN, FLORES, KEVIN, GUPTA, GAURAV
Publication of US20160239674A1publicationCriticalpatent/US20160239674A1/en
Priority to US15/727,018prioritypatent/US10298576B2/en
Application grantedgrantedCritical
Publication of US9800579B2publicationCriticalpatent/US9800579B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A device may provide an upload request to upload a file. The device may receive, based on the upload request, a unique identifier associated with the device. The device may obtain a file key for encrypting the file and a security key for encrypting the file key. The security key may be obtained based on the unique identifier. The device may encrypt the file, using the file key, to create an encrypted file. The device may encrypt the file key, using the security key, to create an encrypted file key. The device may provide the encrypted file and the encrypted file key for storage by a storage device.

Description

Claims (20)

What is claimed is:
1. A device, comprising:
one or more processors to:
provide an upload request to upload a file;
receive, based on the upload request, a unique identifier associated with the device;
obtain a file key for encrypting the file and a security key for encrypting the file key,
the security key being obtained based on the unique identifier;
encrypt the file, using the file key, to create an encrypted file;
encrypt the file key, using the security key, to create an encrypted file key; and
provide the encrypted file and the encrypted file key for storage by a storage device.
2. The device ofclaim 1, where the one or more processors are further to:
provide a download request to download the encrypted file;
obtain, based on the download request, the encrypted file and the encrypted file key;
decrypt the encrypted file key, using the security key, to recover the file key; and
decrypt the encrypted file, using the file key, to recover the file.
3. The device ofclaim 2, where the one or more processors, when providing the upload request, are further to:
provide, by a first application associated with the device, the upload request; and
where the one or more processors, when providing the encrypted file and the encrypted file key, are further to:
provide, by the first application, the encrypted file and the encrypted file key; and
where the one or more processors, when providing the download request, are further to:
provide, by a second application associated with the device, the download request,
the second application being different than the first application; and
where the one or more processors, when receiving the encrypted file and the encrypted file key, are further to:
receive, by the second application, the encrypted file and the encrypted file key.
4. The device ofclaim 2, where the one or more processors, when providing the download request, are further to:
provide the download request to a network device for authentication; and
where the one or more processors, when receiving the encrypted file and the encrypted file key, are further to:
receive the encrypted file and the encrypted file key based on the download request being authenticated.
5. The device ofclaim 2, where the one or more processors, when providing the encrypted file and the encrypted file key, are further to:
provide, to the storage device and in association with the encrypted file and the encrypted file key, the unique identifier; and
where the one or more processors, when receiving the encrypted file and the encrypted file key, are further to:
receive the encrypted file and the encrypted file key based on the unique identifier.
6. The device ofclaim 1, where the encrypted file key is a first encrypted file key;
where the unique identifier is a first unique identifier;
where the security key is a first security key; and
where the one or more processors are further to:
receive a second unique identifier associated with the device,
the second unique identifier being different than the first unique identifier;
obtain a second security key based on the second unique identifier,
the second security key being different than the first security key;
provide an update request for the first encrypted file key;
receive the first encrypted file key based on the update request;
decrypt, using the first security key, the first encrypted file key to recover the file key;
encrypt, using the second security key, the file key to create a second encrypted file key; and
provide, to the storage device, the second encrypted file key.
7. The device ofclaim 1, where the one or more processors, when providing the upload request, are further to:
provide the upload request to a network device for determining the unique identifier; and
where the one or more processors, when receiving the unique identifier, are further to:
receive the unique identifier from the network device or the storage device.
8. A computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors, cause the one or more processors to:
provide an upload request to upload a file;
receive, based on the upload request, a unique identifier;
obtain a file key for encrypting the file and a security key for encrypting the file key,
the security key being obtained based on the unique identifier;
encrypt the file, using the file key, to create an encrypted file;
encrypt the file key, using the security key, to create an encrypted file key; and
provide the encrypted file and the encrypted file key for storage by a storage device.
9. The computer-readable medium ofclaim 8, where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to:
provide a download request to download the encrypted file;
receive, based on the download request, the encrypted file and the encrypted file key;
decrypt the encrypted file key, using the security key, to recover the file key; and
decrypt the encrypted file, using the file key, to recover the file.
10. The computer-readable medium ofclaim 9, where the one or more instructions, that cause the one or more processors to provide the upload request, further cause the one or more processors to:
provide, by a first application associated with the one or more processors, the upload request; and
where the one or more instructions, that cause the one or more processors to provide the encrypted file and the encrypted file key, further cause the one or more processors to:
provide, by the first application, the encrypted file and the encrypted file key; and
where the one or more instructions, that cause the one or more processors to provide the download request, further cause the one or more processors to:
provide, by a second application associated with the one or more processors, the download request,
the second application being different than the first application; and
where the one or more instructions, that cause the one or more processors to receive the encrypted file and the encrypted file key, further cause the one or more processors to:
receive, by the second application, the encrypted file and the encrypted file key.
11. The computer-readable medium ofclaim 9, where the one or more instructions, that cause the one or more processors to provide the download request, further cause the one or more processors to:
provide the download request to a network device for authentication; and
where the or more instructions, that cause the one or more processors to receive the encrypted file and the encrypted file key, further cause the one or more processors to:
receive the encrypted file and the encrypted file key based on the authentication.
12. The computer-readable medium ofclaim 9, where the one or more instructions, that cause the one or more processors to provide the encrypted file and the encrypted file key, further cause the one or more processors to:
provide, to the storage device and in association with the encrypted file and the encrypted file key, the unique identifier; and
where the one or more instructions, that cause the one or more processors to receive the encrypted file and the encrypted file key, further cause the one or more processors to:
receive the encrypted file and the encrypted file key based on the unique identifier.
13. The computer-readable medium ofclaim 8, where the encrypted file key is a first encrypted file key;
where the unique identifier is a first unique identifier;
where the security key is a first security key; and
where the one or more instructions, when executed by the one or more processors, further cause the one or more processors to:
receive a second unique identifier,
the second unique identifier being different than the first unique identifier;
obtain a second security key based on the second unique identifier,
the second security key being different than the first security key;
provide an update request for the first encrypted file key;
receive the first encrypted file key based on the update request;
decrypt, using the first security key, the first encrypted file key to recover the file key;
encrypt, using the second security key, the file key to create a second encrypted file key; and
provide, to the storage device, the second encrypted file key.
14. The computer-readable medium ofclaim 8, where the one or more instructions, that cause the one or more processors to provide the upload request, further cause the one or more processors to:
provide the upload request to a network device for determining the unique identifier; and
where the one or more instructions, that cause the one or more processors to receive the unique identifier, further cause the one or more processors to:
receive the unique identifier from the network device or the storage device.
15. A method, comprising:
providing, by a device, an upload request to upload a file;
receiving, by the device and based on the upload request, a unique identifier associated with the device;
obtaining, by the device, a file key for encrypting the file and a security key for encrypting the file key,
the security key being obtained based on the unique identifier;
encrypting the file, by the device and using the file key, to create an encrypted file;
encrypting the file key, by the device and using the security key, to create an encrypted file key; and
outputting, by the device, the encrypted file and the encrypted file key.
16. The method ofclaim 15, further comprising:
providing a download request to download the encrypted file;
receiving, based on the download request, the encrypted file and the encrypted file key;
decrypting the encrypted file key, using the security key, to recover the file key; and
decrypting the encrypted file, using the file key, to recover the file.
17. The method ofclaim 16, where providing the upload request further comprises:
providing, by a first application associated with the device, the upload request; and
where providing the encrypted file and the encrypted file key further comprises:
providing, by the first application, the encrypted file and the encrypted file key; and
where providing the download request further comprises:
providing, by a second application associated with the device, the download request,
the second application being different than the first application; and
where receiving the encrypted file and the encrypted file key further comprises:
receiving, by the second application, the encrypted file and the encrypted file key.
18. The method ofclaim 16, where providing the download request further comprises:
providing the download request to a network device for authentication; and
where receiving the encrypted file and the encrypted file key further comprises:
receiving the encrypted file and the encrypted file key based on the download request being authenticated.
19. The method ofclaim 15, where the encrypted file key is a first encrypted file key;
where the unique identifier is a first unique identifier;
where the security key is a first security key; and
where the method further comprises:
receiving a second unique identifier associated with the device,
the second unique identifier being different than the first unique identifier;
obtaining a second security key based on the second unique identifier,
the second security key being different than the first security key;
providing an update request for the first encrypted file key;
receiving the first encrypted file key based on the update request;
decrypting, using the first security key, the first encrypted file key to recover the file key;
encrypting, using the second security key, the file key to create a second encrypted file key; and
providing, to the storage device, the second encrypted file key.
20. The method ofclaim 15, where providing the upload request further comprises:
providing the upload request to a network device for determining the unique identifier; and
where receiving the unique identifier further comprises:
receiving the unique identifier from the network device or a storage device, the network device being different than the storage device.
US14/620,7242015-02-122015-02-12Network-based client side encryptionActive2035-08-27US9800579B2 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US14/620,724US9800579B2 (en)2015-02-122015-02-12Network-based client side encryption
US15/727,018US10298576B2 (en)2015-02-122017-10-06Network-based client side encryption

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US14/620,724US9800579B2 (en)2015-02-122015-02-12Network-based client side encryption

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US15/727,018ContinuationUS10298576B2 (en)2015-02-122017-10-06Network-based client side encryption

Publications (2)

Publication NumberPublication Date
US20160239674A1true US20160239674A1 (en)2016-08-18
US9800579B2 US9800579B2 (en)2017-10-24

Family

ID=56621168

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US14/620,724Active2035-08-27US9800579B2 (en)2015-02-122015-02-12Network-based client side encryption
US15/727,018ActiveUS10298576B2 (en)2015-02-122017-10-06Network-based client side encryption

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US15/727,018ActiveUS10298576B2 (en)2015-02-122017-10-06Network-based client side encryption

Country Status (1)

CountryLink
US (2)US9800579B2 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170359175A1 (en)*2016-06-102017-12-14Apple Inc.Support for changing encryption classes of files
US10044509B1 (en)2017-08-142018-08-07Fmr LlcMethod for encrypting and storing data
US20200092263A1 (en)*2018-09-142020-03-19Microsoft Technology Licensing, LlcSecure device-bound edge workload receipt
US20210218722A1 (en)*2017-11-012021-07-15Citrix Systems, Inc.Dynamic crypto key management for mobility in a cloud environment
US20220069981A1 (en)*2020-09-032022-03-03Google LlcDistribute Encryption Keys Securely and Efficiently
CN114417393A (en)*2021-12-082022-04-29马上消费金融股份有限公司File encryption method, system, electronic equipment and computer readable storage medium
US20220239478A1 (en)*2021-01-282022-07-28EMC IP Holding Company LLCKey management and key policies for data encryption in a storage appliance
US11934539B2 (en)*2018-03-292024-03-19Alibaba Group Holding LimitedMethod and apparatus for storing and processing application program information

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11176265B2 (en)*2017-12-292021-11-16Stash America LlcData-centric interactive data security system
US10630652B2 (en)*2017-12-292020-04-21Janine DarlingData-centric secure data technology, archiving, and storage system
CN111711656A (en)*2020-05-152020-09-25山东省计算中心(国家超级计算济南中心) A network edge storage device with security function

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060168580A1 (en)*2003-02-212006-07-27Shunji HaradaSoftware-management system, recording medium, and information-processing device
US20070100913A1 (en)*2005-10-122007-05-03Sumner Gary SMethod and system for data backup
US20070143600A1 (en)*2003-12-232007-06-21Motorola, Inc.Rekeying in secure mobile multicast communications
US20080170692A1 (en)*2007-01-172008-07-17Matsushita Electric Works, Ltd.Systems and methods for distributing updates for a key at a maximum rekey rate
US20140321641A1 (en)*2013-04-252014-10-30FusionPipe Software Solutions Inc.Method and system for decoupling user authentication and data encryption on mobile devices
US20160119294A1 (en)*2014-05-212016-04-28Yahoo! Inc.Methods and systems for data traffic control and encryption

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP1545084B1 (en)*2003-12-182011-06-01Research In Motion LimitedSystem and method for digital rights management
US9166975B2 (en)*2012-02-162015-10-20Inbay Technologies Inc.System and method for secure remote access to a service on a server computer
CA2840489A1 (en)*2011-09-302013-04-04Ranganath C. ABEYWEERAMethod, system and apparatus for a communications client program and an associated transfer server for onymous and secure communications
EP2798565B1 (en)*2011-12-292020-11-18Kingston Digital, Inc.Secure user authentication for bluetooth enabled computer storage devices

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060168580A1 (en)*2003-02-212006-07-27Shunji HaradaSoftware-management system, recording medium, and information-processing device
US20070143600A1 (en)*2003-12-232007-06-21Motorola, Inc.Rekeying in secure mobile multicast communications
US20070100913A1 (en)*2005-10-122007-05-03Sumner Gary SMethod and system for data backup
US20080170692A1 (en)*2007-01-172008-07-17Matsushita Electric Works, Ltd.Systems and methods for distributing updates for a key at a maximum rekey rate
US20140321641A1 (en)*2013-04-252014-10-30FusionPipe Software Solutions Inc.Method and system for decoupling user authentication and data encryption on mobile devices
US20160119294A1 (en)*2014-05-212016-04-28Yahoo! Inc.Methods and systems for data traffic control and encryption

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170359175A1 (en)*2016-06-102017-12-14Apple Inc.Support for changing encryption classes of files
US10592679B2 (en)*2016-06-102020-03-17Apple Inc.Support for changing encryption classes of files
US10044509B1 (en)2017-08-142018-08-07Fmr LlcMethod for encrypting and storing data
US20210218722A1 (en)*2017-11-012021-07-15Citrix Systems, Inc.Dynamic crypto key management for mobility in a cloud environment
US11627120B2 (en)*2017-11-012023-04-11Citrix Systems, Inc.Dynamic crypto key management for mobility in a cloud environment
US11934539B2 (en)*2018-03-292024-03-19Alibaba Group Holding LimitedMethod and apparatus for storing and processing application program information
US20200092263A1 (en)*2018-09-142020-03-19Microsoft Technology Licensing, LlcSecure device-bound edge workload receipt
US20220069981A1 (en)*2020-09-032022-03-03Google LlcDistribute Encryption Keys Securely and Efficiently
US12200119B2 (en)*2020-09-032025-01-14Google LlcDistribute encryption keys securely and efficiently
US20220239478A1 (en)*2021-01-282022-07-28EMC IP Holding Company LLCKey management and key policies for data encryption in a storage appliance
US12081663B2 (en)*2021-01-282024-09-03EMC IP Holding Company LLCKey management and key policies for data encryption in a storage appliance
CN114417393A (en)*2021-12-082022-04-29马上消费金融股份有限公司File encryption method, system, electronic equipment and computer readable storage medium

Also Published As

Publication numberPublication date
US10298576B2 (en)2019-05-21
US9800579B2 (en)2017-10-24
US20180034816A1 (en)2018-02-01

Similar Documents

PublicationPublication DateTitle
US10298576B2 (en)Network-based client side encryption
US10911431B2 (en)Local encryption for single sign-on
US10681548B2 (en)Authenticating mobile devices
US11368445B2 (en)Local encryption for single sign-on
CA2877490C (en)Key agreement for wireless communication
US9374361B2 (en)Cross-native application authentication application
US9628282B2 (en)Universal anonymous cross-site authentication
EP3283964B1 (en)Method of operating a computing device, computing device and computer program
CA2820502C (en)Key agreement using a key derivation key
US11321471B2 (en)Encrypted storage of data
WO2021062387A1 (en)Method, computer program product and apparatus for password protected encryption key recovery
US11445374B2 (en)Systems and methods for authenticating a subscriber identity module swap
CN107920081A (en)Login authentication method and device
US12177355B2 (en)Methods and devices for secure application authentication using a one-way encrypted authentication token
US12120522B2 (en)Provision of application level identity
US20240388900A1 (en)Systems and methods for ephemeral token-based device identifier detection
US20230067169A1 (en)Credential sharing
HK40023059A (en)Key agreement for wireless communication
HK40023059B (en)Key agreement for wireless communication
HK1247477B (en)Key agreement for wireless communication

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:VERIZON PATENT AND LICENSING INC., NEW JERSEY

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BAO, GUANQUN;SHARMA, MANISH;BLONG, DEVIN;AND OTHERS;SIGNING DATES FROM 20150205 TO 20150211;REEL/FRAME:034951/0317

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:4

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8


[8]ページ先頭

©2009-2025 Movatter.jp